Five Tips for Mitigating the Fallout from a Big Data Breach

This is one of the best ways to discover a breach, as well as to identify what information was compromised. Better yet, utilize network recording technology so that you are not dependent on someone being in the right place at the right time to capture it. The best recorder technologies can record 100 percent of the transactions at 10Gb/sec line rates, which eliminates the guesswork around recorders that sample data.

Big Data is pervasive in the enterprise today, and it is only going to get bigger. For example, IT departments are adopting longer retention times for saved data (six months or longer) which, in turn, requires expansion of their existing networked data storage. And with mandated retention policies like Sarbanes-Oxley to account for, end users are also required to capture every data packet that is transacted and retrieve historical data for analysis without any potential data packet loss.

Organizations need to prepare themselves by expanding their network bandwidth to make their data center ‘Big Data’ ready. They also need to take steps to secure their networks. As the volume of networked data grows, data leaks, security breaches, and packet loss are inevitable. Mike Heumann, senior director of marketing, Endace division of Emulex, offers five tips to mitigate the fallout when it happens.